Doing what's right for the customer

Nexum Symantec

There is no upcoming training scheduled right now. Please check back soon.

The two-day ProxySG v6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG v6.6 solution. This an introductory course and is designed for students who are new to the ProxySG solution.

The two-day ProxySG v6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG.


This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.


ProxySG v6.6 Basic Administration
  • Describe the major Secure Web Gateway functions of the ProxySG
  • License and configure a ProxySG
  • Deploy a ProxySG in either explicit or transparent mode
  • Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
  • Use ProxySG access logs to generate reports.
ProxySG v6.6 Advanced Administration
  • Solve common authentication and SSL issues
  • Understand the underlying architecture of SGOS
  • Monitor and analyze ProxySG performance
  • Use policy tracing as a troubleshooting tool


ProxySG v6.6 Basic Administration Module 1: Introduction to the Symantec ProxySG Secure Web Gateway
  • Describe the functions of a proxy server
  • Differentiate proxy servers from firewalls
  • Describe the key features and benefits of the ProxySG
  • List the various ProxySG models
  • Access online Symantec community resources
Module 2: ProxySG Security Deployment Options
  • Describe the three network deployment methods
  • Describe the three possible roles of the ProxySG
Module 3: ProxySG Management Console
  • Describe the relationship between the Management Console and the ProxySG CLI
  • Describe the primary function of the major areas of the Management Console
  • Use the Management Console to access on-box help and Symantec product documentation
Module 4: Traffic Interception Using Proxy Services
  • Understand the functions of proxy services, listeners, and proxy types
  • Describe the three most common proxy services
  • Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
  • Explain the function of common global proxy service settings
Module 5: Hypertext Transfer Protocol
  • Understand how a connection is initiated over the transport layer
  • Identify the components of an HTTP URL
  • Explain the two types of HTTP messages: request and response
  • Identify common response codes
Module 6: Introduction to the Visual Policy Manager
  • Describe the relationship among the VPM, CPL, and the Management Console
  • Describe the default processing order for policy layers and rules
  • Describe triggers and actions that can be used in writing policy
  • Identify the types of objects that the VPM supports
  • Describe some of the best practices to be followed when using the VPM to create policy
Module 7: Filtering Web Content
  • Describe the main concepts of web filtering
  • Describe the primary category databases
  • Describe the category types available to policy
  • Describe how WebFilter and WebPulse work together
Module 8: Using Threat Intelligence to Defend the Network
  • Understand Intelligence Services as provided by the Global Intelligence Network
  • Understand Geolocation and Threat Risk Levels and how they can be used in policy
Module 9: Ensuring Safe Downloads
  • Describe how malware can be transmitted via HTTP
  • Explain the methods, advantages, and disadvantages of file type detection
  • Describe some of the considerations in deciding what content to block as possible malware sources
Module 10: Notifying User of Internet Usage Policies
  • Explain the function and various components of built-in and custom exception pages
  • Describe the function of Notify User objects
  • Identify the types of pages that can be sent to users by using Notify User objects
  • Describe splash pages and coaching pages using Notify User objects in the VPM
Module 11: Access Logging on the ProxySG
  • Describe, at a high level, how the ProxySG performs access logging
  • Describe the components of a ProxySG access log facility
  • Identify default log facilities and log formats
  • Describe common use cases for periodic and continuous uploading of access logs
ProxySG v6.6 Advanced Administration Module 1: Using Authentication Realms
  • Describe the benefits of enabling authentication on the ProxySG
  • Describe, at a high level, the ProxySG authentication architecture
  • Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods
Module 2: Understanding Authentication Credentials
  • Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments
  • Configure the ProxySG to use Kerberos authentication
Module 3: Understanding Authentication Modes
  • Describe authentication surrogates and authentication modes
  • Describe ProxySG authentication in both explicit and transparent deployment mode
Module 4: Understanding HTTPS
  • Describe key components of SSL encryption
  • Describe how the SSL handshake works
  • Describe some of the legal and security considerations related to use of the SSL proxy
Module 5: Managing SSL Traffic on the ProxySG
  • Describe how the SSL proxy service handles SSL traffic
  • Describe the standard keyrings that are installed by default on the ProxySG
  • Identify the types of security certificates that the ProxySG uses
Module 6: Optimizing SSL Interception Performance
  • Configure the ProxySG to process SSL traffic according to best practices for performance
Module 7: SGOS Architecture
  • Identify key components of SGOS
  • Explain the interaction among client workers and software workers in processing client requests
  • Explain the significance of policy checkpoints
  • Describe key characteristics of the SGOS storage subsystem
  • Explain the caching behavior of the ProxySG
Module 8: Caching Architecture
  • Describe the benefits of object caching on the ProxySG
  • Explain the caching-related steps in a ProxySG transaction
  • Identify and describe the HTTP request and response headers related to caching
  • Describe, in general terms, how the ProxySG validates cached objects to ensure freshness
  • Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching
Module 9: System Diagnostics
  • Describe the use of the health monitor and health checks
  • Explain the use of the event and access logs
  • Describe the information available in advanced URLs and sysinfo files
  • Describe the function of policy tracing and packet captures
Module 10: Introduction to Content Policy Language (CPL)
  • Describe the fundamental concepts and purposes of ProxySG policy transactions
  • Understand the relationship of layers, rules, conditions, properties, and triggers
  • Describe the two types of actions in CPL
  • Describe how to write, edit, and upload CPL code
Module 11: Using Policy Tracing for Troubleshooting
  • Identify the two main types of ProxySG policy traces
  • Describe the various sections of a policy trace result
  • Configure a global and policy-driven trace
  • Access and interpret policy trace results
Module 12: ProxySG Integration
  • Identify other Symantec products that can be used as part of a complete security solution